Top 10 op risks 2018: IT disruption
Fear of disabling cyber attack trumps risk of data theft
A wave of DDoS attacks on three Dutch banks in January 2018 neatly illustrates the continued vulnerability of the banking sector to IT disruptions through malicious cyber attack, despite vast spending on sophisticated defences.
ABN Amro suffered a series of DDoS strikes over the weekend of January 27–28 that slowed or halted its online and mobile banking services. The attacks were heavier than previous ones and lasted longer, the bank reported. Rabobank and ING also experienced attacks during the same period.
“Denial of service attacks, together with the reputational risk such denial of service will bring, is of greatest concern for systemically important banks,” says an op risk executive at a South African bank. “Our focus is on strengthening business resilience capability.”
DDoS attacks remain unpredictable and vary widely in terms of speed and complexity. Unfortunately for banks, they’re only the tip of the iceberg when it comes to disruptive threats – cyber and physical – to their networks. Malware, employee error and plain old hardware failure can be just as crippling when it comes to a loss of operational functionality.
Add in the risk of physical disruption to a bank’s network – from sources as varied as a citywide power outage, to an attack from a weaponised electromagnetic pulse – and it’s not hard to see why op risk practitioners rank IT disruption as one of the most significant operational threats facing their firms.
The disruption to services from successful ransomware attacks is usually far more costly than payment made to cyber thieves, as the 2017 WannaCry attack showed. Still harder to quantify are the thousands of man-hours invested in universal training for staff, or spent trying to trace when and where successful breaches occurred.
What is DDoS?
DDoS, or distributed denial of service, is a form of cyber attack that aims to cripple an element of an organisation’s IT system – its website or servers – by inundating it with traffic from multiple sources. Typically, the attacker will take control of a number of unwitting third-party devices known as bots to perform the attack. The greater the botnet, or network of bots, the more harmful the attack.
Once under attack, the compromised system will be choked with requests, preventing it from performing its intended function; so, a website will crash or a server will be disabled.
Financial services accounted for 20% of DDoS attacks that network security provider Verisign confronted during the third quarter of 2017 – second to IT services and cloud providers (45%), whom banks also rely on to provide everything from external data storage to extra processing capacity.
The average attack size for the financial services sector was 0.63 gigabytes per second. This is lower than the average across all sectors, which stands at 0.8 Gbps. In fact, overall attack sizes have been trending downward over the past year, an indication perhaps that remedial action is becoming more effective. But the vast majority – 88% – of DDoS incidents featured multiple attack types, affecting the targeted company across different layers of its network.
Ensuring resiliency against disruptive cyber attack is an impossibly broad task for op risk managers, notes the head of op risk at a US bank, taking in everything from information security controls to scenarios and war games, third-party oversight, data protection, and fraud authentication processes.
Malicious cyber attack is far from the only source of IT disruptions, as US lender Citizens Bank discovered last March when its direct deposits, online bill payment, point-of-sale, ATM and credit card systems became unavailable, which the bank attributed to a vendor processing issue.
“As more clients rely on digital interfaces, the impact and frequency of outages presents increased risk,” says the head of operational risk at a Canadian bank. “Loss of system availability to our online and mobile systems will have negative impact to client experience and our reputation.”
Many of last year’s largest IT disruptions can be attributed to faulty software. Applying fixes or updates to software flaws, known as patch management, is an area of importance as attackers may target these vulnerabilities in bank defences. The US Comptroller of the Currency has cited weaknesses in controls and governance related to information security within banks as a concern.
"Where firms are making changes to live systems and processes – updating one version of software to another – those are where we see a lot of issues with outages. They find it didn’t go right, and the next thing they know, their online banking platform goes down. Those outages only tend to last a couple of hours, but they get a lot of chatter on social media. It's a breach because change management was not done properly," says a senior source at one US regulator.
Some argue regulators’ expectations are unrealistic when it comes to cyber attacks, however. US prudential regulators say financial institutions should be capable of a two-hour return to operations following a cyber attack – analogous to the expectations for providers of core clearing and settlement systems contained in a document on sound policy practices for physical resiliency issued in 2003 by US financial authorities following the 9/11 attacks.
Op risk practitioners are increasingly questioning this stance, arguing the ability of a firm to restore a system to operations, and the time needed for doing so, varies greatly depending on the nature of the attack and the size and complexity of the system. Unlike physical disruptions such as a loss of power, which are immediately apparent and are limited to a defined location, cyber attacks are often difficult to detect or diagnose and frequently pose a risk of contagion to other systems or the market at large. Additional time is therefore required for investigating the actual cause of the operational impact and then testing and validating systems before the systems are ready for safe operation.
As more clients rely on digital interfaces, the impact and frequency of outages presents increased risk
Head of op risk at a Canadian bank
Practitioners outlined these difficulties in their response to the US regulators’ push for a two-hour return to operations. A premature return might expose a firm to further damage before the nature of the attack was fully understood, the American Bankers Association noted, adding that the timeframe was “not technically feasible”.
Regulators are looking to get smarter when it comes to cyber risk, too. The US Treasury is applying network theory to help model defensive strategies against cyber attacks on the financial system. The Office of Financial Research, a department of the Treasury, is building maps that highlight this interconnectedness between nodes within a network. Against a random attack, a hub such as a financial market utility that is connected to the largest number of nodes, would be the most important to protect. This is because its failure would cause the greatest disruption to the network. Targeted attacks, however, might necessitate the defence of hubs which have the most direct links to other hubs in the network: that is, the hub that has to travel through the fewest nodes before infecting another hub.
In spite of the scale of the threat, some banks believe regulators have taken an unco-ordinated approach to tackling it. The focus so far has been on imposing information sharing and other requirements, such as the implementation of a firm-specific cyber risk programme, on financial institutions. This has resulted in a big increase in paperwork for firms and the diversion of resources to compliance.
To help alleviate the pressure on individual banks, the Financial Systemic Analysis & Resilience Center, a co-ordinating group of eight systemically important institutions, including CME, the Depository Trust & Clearing Corp, and Intercontinental Exchange, is working to identify systemic vulnerabilities related to cyber threats. The group is an offshoot of the larger Financial Services Information Sharing and Analysis Center (FS-ISAC), which shares information on cyber attacks across more than 5,000 organisations.
The Financial Services Sector Coordinating Council is another industry group tackling cyber risks. The group outlined specific actions the US government should take to improve cyber security in a set of recommendations published in January 2017. These include investing further in financial services supporting infrastructure and risk-based cyber research and development.
Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.
To access these options, along with all other subscription benefits, please contact info@risk.net or view our subscription options here: http://subscriptions.risk.net/subscribe
You are currently unable to print this content. Please contact info@risk.net to find out more.
You are currently unable to copy this content. Please contact info@risk.net to find out more.
Copyright Infopro Digital Limited. All rights reserved.
As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (point 2.4), printing is limited to a single copy.
If you would like to purchase additional rights please email info@risk.net
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (clause 2.4), an Authorised User may only make one copy of the materials for their own personal use. You must also comply with the restrictions in clause 2.5.
If you would like to purchase additional rights please email info@risk.net
More on Risk management
Climate Risk Benchmarking: explore the data
View interactive charts from Risk.net’s 43-bank study, covering climate governance, physical and transition risks, stress-testing, technology, and regulation
‘The models are not bloody wrong’: a storm in climate risk
Risk.net’s latest benchmarking exercise shows banks confronting decades-long exposures, while grappling with political headwinds, limited resources and data gaps
ISITC’s Paul Fullam on the ‘anxiety’ over T+1 in Europe
Trade processing chair blames budget constraints, testing and unease over operational risk ahead of settlement move
Cyber insurance premiums dropped unexpectedly in 2025
Competition among carriers drives down premiums, despite increasing frequency and severity of attacks
Op risk data: Kaiser will helm half-billion-dollar payout for faking illness
Also: Loan collusion clobbers South Korean banks; AML fails at Saxo Bank and Santander. Data by ORX News
Market doesn’t share FSB concerns over basis trade
Industry warns tougher haircut regulation could restrict market capacity as debt issuance rises
CGB repo clearing is coming to Hong Kong … but not yet
Market wants at least five years to build infrastructure before regulators consider mandate
Rethinking model validation for GenAI governance
A US model risk leader outlines how banks can recalibrate existing supervisory standards